Hi,
No, it is not impacted. We have tested it manually and verified by code inspection. The vulnerability in the reference implementation is caused by using an unsigned int when indexing the input. The Mbed TLS implementation does not do that.
Best regards, Janos (Mbed TLS developer)
From: Oubaid AKRMI via mbed-tls mbed-tls@lists.trustedfirmware.org Date: Thursday, 12 October 2023 at 17:00 To: mbed-tls@lists.trustedfirmware.org mbed-tls@lists.trustedfirmware.org Subject: [mbed-tls] Re: [Mbed-tls-announce] New Mbed TLS releases : 3.5.0 and 2.28.5 Hi,
Is the SHA-3 impacted by the vulnerability reported in NIST vulnerability database (link below) ? https://nvd.nist.gov/vuln/detail/CVE-2022-37454
“Description The Keccak XKCP SHA-3 reference implementation before fdc6fef has an integer overflow and resultant buffer overflow that allows attackers to execute arbitrary code or eliminate expected cryptographic properties. This occurs in the sponge function interface. “
Best regards,
[Shape, rectangle Description automatically generated]
Oubaid AKRMI | Mobile: +33 7 53 06 08 49 GPM | Application Security Engineer
[Icon Description automatically generated]https://www.facebook.com/STMicroelectronics.NV/ [cid:image003.png@01D9FD35.14D24980] https://twitter.com/st_world [Icon Description automatically generated] https://www.linkedin.com/company/stmicroelectronics/ [Icon Description automatically generated] https://www.instagram.com/stmicroelectronics.nv/ [Icon Description automatically generated] https://www.youtube.com/user/STonlineMedia ST online: www.st.comhttps://stmicroelectronics-my.sharepoint.com/personal/oubaid_akrmi_st_com/Documents/www.st.com